OWASP Cambridge

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sarantis Makoudis is a professional Penetration Tester working for 7Safe, part of the PA Consulting Group. He received his BSc Degree on Digital Systems during 2010 and decided to continue his academic career on the subject of IT Security. He was awarded with an MSc degree on Information Security from Royal Holloway, University of London after completing his thesis on “Two-Factor authentication protocols for Secure Transactions using Mobile Phones and NFC Tags”. Sarantis joined 7Safe shortly afterwards as a Penetration Tester and security researcher, specialised in Web application security testing.

Android (in)Security: The goal of this presentation is to show typical exploitation scenarios of Android applications and how they can be used or manipulated to steal credentials and information from a user. The scenarios include installation of malicious programs, e.g. malicious keyboards, manipulations on the application to bypass security authentications, code injections inside an apk and phishing attacks targeting specific applications.

Nikhil Sreekumar is a penetration tester working for UK based organisation - 7Safe, part of PA Consulting Group. He spends a majority of his free time either rock climbing, dreaming about cars or researching new vulnerabilities and attack techniques. And, when we gets time he spends time assessing web applications and network infrastructure for security vulnerabilities and business logic flaws.

Power On, Powershell: The heart starts pounding, the brain goes into overdrive with adrenaline and a smile starts appearing. You just got access into a Windows box using a user account. Then you realise there is an AV runing on the system, and the user account using which you got in is actually a restricted account.